FreeBSD : logstash -- SSL/TLS vulnerability with Lumberjack input (c470bcc7-33fe-11e5-a4a5-002590263bf5)

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Elastic reports :

Vulnerability Summary: All Logstash versions prior to 1.5.2 that use
Lumberjack input (in combination with Logstash Forwarder agent) are
vulnerable to a SSL/TLS security issue called the FREAK attack. This
allows an attacker to intercept communication and access secure data.
Users should upgrade to 1.5.3 or 1.4.4.

Remediation Summary: Users that do not want to upgrade can address the
vulnerability by disabling the Lumberjack input.

See also :

https://www.elastic.co/community/security
http://www.nessus.org/u?51a894cd

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 85034 ()

Bugtraq ID:

CVE ID: CVE-2015-5378

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now